899 research outputs found

    Authentication and authorisation in entrusted unions

    Get PDF
    This paper reports on the status of a project whose aim is to implement and demonstrate in a real-life environment an integrated eAuthentication and eAuthorisation framework to enable trusted collaborations and delivery of services across different organisational/governmental jurisdictions. This aim will be achieved by designing a framework with assurance of claims, trust indicators, policy enforcement mechanisms and processing under encryption to address the security and confidentiality requirements of large distributed infrastructures. The framework supports collaborative secure distributed storage, secure data processing and management in both the cloud and offline scenarios and is intended to be deployed and tested in two pilot studies in two different domains, viz, Bio-security incident management and Ambient Assisted Living (eHealth). Interim results in terms of security requirements, privacy preserving authentication, and authorisation are reported

    Enabling interoperable distributed ledger technology with legacy platforms for enterprise digitalization

    Get PDF
    Presently to achieve enterprise digitalization technologies such as Distributed Ledger Technologies (DLT) has now been deployed to support digital services provided by enterprises. But several challenges in DLTs remain to be addressed, including the interoperability, standardization, and integration. Therefore, this study provides theoretical and practical understanding of DLT interoperability and identified the factors that influence the interoperability of DLTs. Also, an architecture is designed to shows how interoperability can be achieved in DLTs and legacy systems supported by Application Programming Interface (API). A case study is presented to illustrate the applicability of the architecture to support a digital energy marketplace.acceptedVersio

    e-Health for Rural Areas in Developing Countries: Lessons from the Sebokeng Experience

    Get PDF
    We report the experience gained in an e-Health project in the Gauteng province, in South Africa. A Proof-of-Concept of the project has been already installed in 3 clinics in the Sebokeng township. The project is now going to be applied to 300 clinics in the whole province. This extension of the Proof-of-Concept can however give rise to security aws because of the inclusion of rural areas with unreliable Internet connection. We address this problem and propose a safe solution

    Trust in a multi-tenant, logistics, data sharing infrastructure:Opportunities for blockchain technology

    Get PDF
    In support of the trend towards ever more complex supply chain collaboration for the physical Internet, a trusted, multi-tenant (and interoperable) data sharing infrastructure has to be enabled. Trust is a condition sine qua non organizations may not be prepared to share potentially competitive sensitive information. As such, trust has to be an essential design aspect for any multi-tenant data sharing infrastructure for the data sharing stakeholders To overcome the challenges for trusted data sharing, various reference architectures for a trusted, multi-tenant, data sharing infrastructure are being developed. As such, the Industrial Data Space (IDS) initiative is currently gaining attention. It’s based on the architectural principles of keeping the data owner in control over his data and keeping data, data processing and data distribution at the source. Its reference architecture is strongly grounded on a role / stakeholder model for the intermediary trusted roles to enable peer-to-peer data sharing over a controlled and trusted connector infrastructure. The intermediary trusted roles may contain and process meta-data on the data sources, the data transactions and/or on the identities of the parties involved in the data sharing. This paper focuses on the role of blockchain technology for improving trust levels for such intermediary trusted roles

    Middleware Technologies for Cloud of Things - a survey

    Get PDF
    The next wave of communication and applications rely on the new services provided by Internet of Things which is becoming an important aspect in human and machines future. The IoT services are a key solution for providing smart environments in homes, buildings and cities. In the era of a massive number of connected things and objects with a high grow rate, several challenges have been raised such as management, aggregation and storage for big produced data. In order to tackle some of these issues, cloud computing emerged to IoT as Cloud of Things (CoT) which provides virtually unlimited cloud services to enhance the large scale IoT platforms. There are several factors to be considered in design and implementation of a CoT platform. One of the most important and challenging problems is the heterogeneity of different objects. This problem can be addressed by deploying suitable "Middleware". Middleware sits between things and applications that make a reliable platform for communication among things with different interfaces, operating systems, and architectures. The main aim of this paper is to study the middleware technologies for CoT. Toward this end, we first present the main features and characteristics of middlewares. Next we study different architecture styles and service domains. Then we presents several middlewares that are suitable for CoT based platforms and lastly a list of current challenges and issues in design of CoT based middlewares is discussed.Comment: http://www.sciencedirect.com/science/article/pii/S2352864817301268, Digital Communications and Networks, Elsevier (2017
    • …
    corecore